Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction.
Shurook S. AlmohamadeJohn A. ClarkJames LawPublished in: ETAA (2021)
Keyphrases
- human robot interaction
- user authentication
- remote user authentication scheme
- password guessing
- smart card
- authentication scheme
- gesture recognition
- human robot
- biometric authentication
- robot programming
- security analysis
- keystroke dynamics
- service robots
- information security
- authentication protocol
- humanoid robot
- pointing gestures
- security protocols
- computer security
- data mining
- public key
- biometric systems
- user interface
- feature extraction
- information systems